The Global Economics of Knowledge Protection: A Bibliometric Analysis of Cybersecurity and Intellectual Capital Research
-
Darya DANCAKOVÁ Department of Banking and Investment, Faculty of Economics, Technical University of Košice, Slovakia
This study analyses the global patterns of intellectual capital protection, showing how cybersecurity functions as a key mechanism for preserving knowledge assets that support economic development and national security. Using a dataset of 3,772 publications indexed in the Web of Science (2000–2025), a comprehensive bibliometric analysis uncovers the global dynamics driving scientific productivity in this emerging field. The results reveal significant differences in national performance, assessed by publication output, citation impact, and collaboration intensity. The United States and China lead in both volume and influence, acting as key global hubs of international activity. Research networks that enhance global visibility through partnerships. At the author level, the findings indicate that scholarly impact relies less on quantity and more on visibility, collaboration, and citation resonance, highlighting a shift from productivity-driven to influence-oriented research recognition. Overall, the study shows that IC–cybersecurity scholarship is shaped by a highly concentrated global structure, where a few leading nations and influential authors set the intellectual agenda through sustained collaboration and cross-disciplinary engagement.
Copyright© 2025 The Author(s). This article is distributed under the terms of the license CC-BY 4.0., which permits any further distribution in any medium, provided the original work is properly cited.
Article’s history: Received 15th of October, 2025; Revised 6th of November, 2025; Accepted 21th of November, 2025; Available online: 30th of December, 2025. Published as article in the Volume XX, Winter, Issue 4(90), December, 2025.
Dancaková, D. (2025). The Global Economics of Knowledge Protection: A Bibliometric Analysis of Cybersecurity and Intellectual Capital Research. Journal of Applied Economic Sciences, Volume XX, Winter, 4(90), 695 – 715. https://doi.org/10.57017/jaes.v20.4(90).04
Acknowledgments/Funding: This study was supported by the Slovak Research and Development Agency under Contract No. VV-MVP-24-0272.
Conflict of Interest Statement: The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Data Availability Statement: Bibliometric data for this research were sourced from the Web of Science Core Collection and are available through the database’s public access portal at https://www.webofscience.com
Adi, Y., Baum, C., Cisse, M., Pinkas, B., & Keshet, J. (2018). Turning your weakness into a strength: Watermarking deep neural networks by backdooring. In 27th USENIX security symposium (USENIX Security 18) (pp. 1615-1631). https://doi.org/10.5555/3277203.3277324
Al-Alawi, A., & Alghasra, A. (2024). A Systematic Review Investigating Cyberthreats and the Preservation of Intellectual Capital in Big Data (p. 11). https://doi.org/10.1109/ICETSIS61505.2024.10459611
Ali, M. A., Hussin, N., Haddad, H., Al-Araj, R., & Abed, I. A. (2021). A Multidimensional View of Intellectual Capital: The Impact on Innovation Performance. Journal of Open Innovation: Technology, Market, and Complexity, 7(4), 216. https://doi.org/10.3390/joitmc7040216
Ali, S. E. A., Lai, F.-W., Jan, A. A., Rahman, H. ur, Shah, S. Q. A., & Hamad, S. (2024). Does intellectual capital curb the long-term effect of information security breaches on firms’ market value? Quality & Quantity, 58(4), 3673–3702. https://doi.org/10.1007/s11135-023-01797-3
Ali-Hassan, H., & Ali-Hassan, H. (2009). Social Capital Theory (social-capital-theory) [Chapter]. https://Services.Igi-Global.Com/Resolvedoi/Resolve.Aspx?Doi=10.4018/978-1-60566-659-4.Ch024, IGI Global Scientific Publishing. https://doi.org/10.4018/978-1-60566-659-4.ch024
Archibugi, D., & Coco, A. (2004). A new indicator of technological capabilities for developed and developing countries (ArCo). World Development, 32(4), 629-654. https://doi.org/10.1016/j.worlddev.2003.10.008
Ardito, L., Petruzzelli, A. M., Panniello, U., & Garavelli, A. C. (2018). Towards Industry 4.0: Mapping digital technologies for supply chain management-marketing integration. Business Process Management Journal, 25(2), 323–346. https://doi.org/10.1108/BPMJ-04-2017-0088
Aria, M., & Cuccurullo, C. (2017). Bibliometrix: An R-tool for comprehensive science mapping analysis. Journal of Informetrics, 11(4), 959-975. https://doi.org/10.1016/j.joi.2017.08.007
Avery, A. (2021). After the disclosure: measuring the short-term and long-term impacts of data breach disclosures on the financial performance of organizations. Information & Computer Security, 29(3), 500-525. https://doi.org/10.1108/ICS-10-2020-0161
Ayereby, M. (2018). Overcoming Data Breaches and Human Factors in Minimizing Threats to Cyber-Security Ecosystems. Walden Dissertations and Doctoral Studies. https://scholarworks.waldenu.edu/dissertations/6163
Balozian, P., Leidner, D., & Xue, B. (2021). Toward an intellectual capital cyber security theory: Insights from Lebanon. Journal of Intellectual Capital, 23(6), 1328–1347. https://doi.org/10.1108/JIC-05-2021-0123
Bana, S., Brynjolfsson, E., Jin, W., Steffen, S., & Wang, X. (2023). Human Capital Acquisition in Response to Data Breaches (SSRN Scholarly Paper No. 3806060). Social Science Research Network. https://doi.org/10.2139/ssrn.3806060
Bilal, M., Xicang, Z., Jiying, W., Sohu, J. M., Akhtar, S., & Hassan, M. I. U. (2025). Digital transformation and SME innovation: A comprehensive analysis of mediating and moderating effects. Journal of the Knowledge Economy, 16(1), 1153–1182. https://doi.org/10.1007/s13132-024-02145-y
Bongiovanni, I., Renaud, K., & Cairns, G. (2020). Securing intellectual capital: An exploratory study in Australian universities. Journal of Intellectual Capital, 21(3), 481–505. https://doi.org/10.1108/JIC-08-2019-0197
Brooking, A. (1997). Intellectual Capital. International Thomson Business Press. ISBN-10: 1861520239, ISBN-13: 9781861520234
Cabrilo, S., Dahms, S., & Tsai, F.-S. (2024). Synergy between multidimensional intellectual capital and digital knowledge management: Uncovering innovation performance complexities. Journal of Innovation & Knowledge, 9(4), 100568. https://doi.org/10.1016/j.jik.2024.100568
Cohen, J. E. (2000). Examined Lives: Informational Privacy and the Subject as Object. Stanford Law Review, 52(5), 1373–1438. https://doi.org/10.2307/1229517
de Frutos-Belizón, J., García-Carbonell, N., Guerrero-Alba, F., & Sánchez-Gardey, G. (2024). An empirical analysis of individual and collective determinants of international research collaboration. Scientometrics, 129(5), 2749-2770 https://doi.org/10.1007/s11192-024-04999-0
de Rojas, F. H., Pita, P. R., & Martínez, J. E. P. (2024). Assessing the European association between digitalization and innovation. Telecommunications Policy, 48(7), 102810. https://doi.org/10.1016/j.telpol.2024.102810
Díaz-Vega, M. I., & Gutierrez-Rincon, V. (2024). The Effects of Structural, Relational and Human Capital on Entrepreneurship and Innovation in Colombian Micro and Small Software Companies. Journal of Technology Management and Innovation, 19(2), 3–15. https://doi.org/10.4067/S0718-27242024000200003
Drucker, P. F. (Ed.). (1993). Other books by Peter F. Drucker. In Post-Capitalist Society (p. ii). Butterworth-Heinemann. https://doi.org/10.1016/B978-0-7506-0921-0.50001-X
Dumay, J. (2016). A critical reflection on the future of intellectual capital: From reporting to disclosure. Journal of Intellectual Capital, 17(1), 168–184. https://doi.org/10.1108/JIC-08-2015-0072
Dwivedi, Y. K., Hughes, L., Ismagilova, E., Aarts, G., Coombs, C., Crick, T., Duan, Y., Dwivedi, R., Edwards, J., Eirug, A., Galanos, V., Ilavarasan, P. V., Janssen, M., Jones, P., Kar, A. K., Kizgin, H., Kronemann, B., Lal, B., Lucini, B., … Williams, M. D. (2021). Artificial Intelligence (AI): Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy. International Journal of Information Management, 57, 101994. https://doi.org/10.1016/j.ijinfomgt.2019.08.002
Egghe, L. (2006). Theory and practise of the g-index. Scientometrics, 69(1), 131–152. https://doi.org/10.1007/s11192-006-0144-7
Elsten, C., & Hill, N. (2017). Intangible Asset Market Value Study? (SSRN Scholarly Paper No. 3009783). Social Science Research Network. https://papers.ssrn.com/abstract=3009783
Farrand, B., Carrapico, H., & Turobov, A. (2024). The new geopolitics of EU cybersecurity: security, economy and sovereignty. International Affairs, 100(6), 2379-2397. https://doi.org/10.1093/ia/iiae231
Fortunato, S., Bergstrom, C. T., Börner, K., Evans, J. A., Helbing, D., Milojević, S., Petersen, A. M., Radicchi, F., Sinatra, R., Uzzi, B., Vespignani, A., Waltman, L., Wang, D., & Barabási, A.-L. (2018). Science of science. Science, 359(6379), eaao0185. https://doi.org/10.1126/science.aao0185
Garcia-Perez, A., Sallos, M. P., & Tiwasing, P. (2021). Dimensions of cybersecurity performance and crisis response in critical infrastructure organisations: An intellectual capital perspective. Journal of Intellectual Capital, 24(2), 465–486. https://doi.org/10.1108/JIC-06-2021-0166
Gerth, F., Tan, A. W. K., Kwa, P. T. H. & Roche, O. P. (2025). Cybersecurity Job Requirements in Asian countries: An analysis of workforce trends and future implications. Journal of Applied Economic Sciences, Volume XX, Summer, 2(88), 192206. https://doi.org/10.57017/jaes.v20.2(88).02
He, W., Ash, I., Anwar, M., Li, L., Yuan, X., Xu, L., & Tian, X. (2019). Improving employees’ intellectual capacity for cybersecurity through evidence-based malware training. Journal of Intellectual Capital, 21(2), 203–213. https://doi.org/10.1108/JIC-05-2019-0112
Hirsch, J. E. (2005). An index to quantify an individual’s scientific research output. Proceedings of the National Academy of Sciences of the United States of America, 102(46), 16569–16572. https://doi.org/10.1073/pnas.0507655102
Hirsch, J. E. (2007). Does the h index have predictive power? Proceedings of the National Academy of Sciences, 104(49), 19193-19198. https://doi.org/10.1073/pnas.070796210
Hong, Y., Chen, T., & Zhang, Y. (2025). Individual intellectual capital, creative process engagement and information security policy compliance. Journal of Intellectual Capital, 1–24. https://doi.org/10.1108/JIC-04-2025-0141
Jelodar, H., Wang, Y., Yuan, C., Feng, X., Jiang, X., Li, Y., & Zhao, L. (2019). Latent Dirichlet allocation (LDA) and topic modelling: Models, applications, a survey. Multimedia Tools and Applications, 78(11), 15169–15211. https://doi.org/10.1007/s11042-018-6894-4
Khadka, K., & Ullah, A. B. (2025). Human factors in cybersecurity: An interdisciplinary review and framework proposal. International Journal of Information Security, 24(3), 119. https://doi.org/10.1007/s10207-025-01032-0
Kianto, A., & Cabrilo, S. (2023). Futurizing the Intellectual Capital Theory. European Conference on Knowledge Management, 24(1), 178–183. https://doi.org/10.34190/eckm.24.1.1758
Kinda, A. (2025). Effects of digital innovations on sustainable development in West African Economic and Monetary Union (WAEMU). Journal of Applied Economic Sciences, Volume XX, Summer, 2(88), 220 – 231. https://doi.org/10.57017/jaes.v20.2(88).04
Koca, M., & Çiftçi, S. (2025). A comprehensive bibliometric analysis of Big Data and Cyber Security: intellectual structure, trends, and global collaborations, Knowledge and Information Systems, 1-26. https://doi.org/10.1007/s10115-025-02531-1
Kushairi, N., & Ahmi, A. (2021). Flipped classroom in the second decade of the Millenia: A Bibliometrics analysis with Lotka’s law. Education and Information Technologies, 26(4), 4401–4431. https://doi.org/10.1007/s10639-021-10457-8
La Torre, M., Dumay, J., & Rea, M. A. (2018). Breaching intellectual capital: Critical reflections on Big Data security. Meditari Accountancy Research, 26(3), 463–482. https://doi.org/10.1108/MEDAR-06-2017-0154
Landini, F., Arrighetti, A., & Lasagni, A. (2020). Economic crisis and firm exit: do intangibles matter? Industry and Innovation, 27(5), 445-479. https://doi.org/10.1080/13662716.2018.1544065
Lotka, A. J. (1926). The frequency distribution of scientific productivity. Journal of the Washington Academy of Sciences, 16(12), 317–323. https://www.jstor.org/stable/24529203
Madhani, P. M. (2012). Intangible Assets: Value Drivers for Competitive Advantage. In G. N. Gregoriou & N. Finch (Eds), Best Practices in Management Accounting (pp. 146–165). Palgrave Macmillan UK. https://doi.org/10.1057/9780230361553_10
Madsen, D. Ø. (2019). The emergence and rise of Industry 4.0 viewed through the lens of management fashion theory. Administrative Sciences, 9(3), 71. https://doi.org/10.3390/admsci9030071
Majchrzak, A., Faraj, S., Kane, G. C., & Azad, B. (2013). The Contradictory Influence of Social Media Affordances on Online Communal Knowledge Sharing. Journal of Computer-Mediated Communication, 19(1), 38–55. https://doi.org/10.1111/jcc4.12030
Manavalan, E., & Jayakrishna, K. (2019). A review of Internet of Things (IoT) embedded sustainable supply chain for industry 4.0 requirements. Computers & Industrial Engineering, 127, 925–953. https://doi.org/10.1016/j.cie.2018.11.030
Mavani, C., Mistry, H., Patel, R., & Goswami, A. (2024). The Role of Cybersecurity in Protecting Intellectual Property. International Journal on Recent and Innovation Trends in Computing and Communication, 12, 529–538. https://ijritcc.org/index.php/ijritcc/article/view/10935
Moher, D., Liberati, A., Tetzlaff, J., Altman, D. G., & PRISMA Group. (2009). Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement. PLoS Medicine, 6(7), e1000097. https://doi.org/10.1371/journal.pmed.1000097
Nguyen Thi Phuong, G., Thai Dong, T., Nguyen Binh Phuong, D., Le Huu, H., & Chau Huyen, T. (2024). Assess the impact of blockchain application in electronic commerce on customer’s shopping experience. Journal of Applied Economic Sciences, Volume XIX, Fall, 3(85), 305 – 316. https://doi.org/10.57017/jaes.v19.3(85).06
Nonala, I., & Kenney, M. (1991). Towards a new theory of innovation management: A case study comparing Canon, Inc. and Apple Computer, Inc. Journal of Engineering and Technology Management, 8(1), 67–83. https://doi.org/10.1016/0923-4748(91)90005-C
Ode, E., Awolowo, I. F., Nana, R., & Olawoyin, F. S. (2025). Social Capital and Artificial Intelligence Readiness: The Mediating Role of Cyber Resilience and Value Construction of SMEs in Resource‑Constrained Environments. Information Systems Frontiers. https://doi.org/10.1007/s10796-025-10608-z
Oztemel, E., & Gursev, S. (2020). Literature review of Industry 4.0 and related technologies. Journal of Intelligent Manufacturing, 31(1), 127–182. https://doi.org/10.1007/s10845-018-1433-8
Pao, M. L. (1986). An empirical examination of Lotka’s Law. Journal of the American Society for Information Science, 37(1), 26–33. https://doi.org/10.1002/asi.4630370105
Page, M. J., McKenzie, J. E., Bossuyt, P. M., Boutron, I., Hoffmann, T. C., Mulrow, C. D., Shamseer, L., Tetzlaff, J. M., Akl, E. A., Brennan, S. E., Chou, R., Glanville, J., Grimshaw, J. M., Hróbjartsson, A., Lalu, M. M., Li, T., Loder, E. W., Mayo-Wilson, E., McDonald, S., … Moher, D. (2021). The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. BMJ (Clinical Research Ed.), 372, n71. https://doi.org/10.1136/bmj.n71
Petratos, P. N. (2021). Misinformation, disinformation, and fake news: Cyber risks to business. Business Horizons, 64(6), 763–774. https://doi.org/10.1016/j.bushor.2021.07.012
Rajapathirana, R. P. J., & Hui, Y. (2018). Relationship between innovation capability, innovation type, and firm performance. Journal of Innovation & Knowledge, 3(1), 44–55. https://doi.org/10.1016/j.jik.2017.06.002
Renaud, K., Von Solms, B., & Von Solms, R. (2019). How does intellectual capital align with cyber security? Journal of Intellectual Capital, 20(5), 621-641. https://doi.org/10.1108/JIC-04-2019-0079
Schatz, D., Bashroush, R., & Wall, J. (2017). Towards a more representative definition of cyber security. Journal of Digital Forensics, Security and Law, 12(2), 8. https://doi.org/10.15394/jdfsl.2017.1476
Snyder, H., & Crescenzi, A. (2013). Intellectual capital and economic espionage: New crimes and new protections. In Transnational Financial Crime. Routledge. https://doi.org/10.4324/9781315084572-24
Thum-Thysen, A., Voigt, P., Maier, C., Bilbao-Osorio, B., & Ognyanova, D. (2017). Unlocking investment in intangible assets in Europe. Quarterly Report on the Euro Area (QREA), 16(1), 23–35. https://economy-finance.ec.europa.eu/document/download/b7d987bc-2ea1-48ab-ad11-320f7493a359_en?filename=dp047_en.pdf
Toffler, A. (1990). Powershift: Knowledge. Wealth and Violence at the Edge of the 21st Century. ISBN: 0-553-05776-62-253-06261-8
Tosun, O. K. (2019). Cyber Attacks and Stock Market Activity (SSRN Scholarly Paper No. 3190454). Social Science Research Network. https://doi.org/10.2139/ssrn.3190454
Von Solms, B., & Von Solms, R. (2018). Cybersecurity and information security – what goes where? Information and Computer Security, 26(1), 2–9. https://doi.org/10.1108/ICS-04-2017-0025
Yilmaz, A. A., & Tuzlukaya, S. E. (2023). The relation between intellectual capital and digital transformation: A bibliometric analysis. International Journal of Innovation Science, 16(2), 244–264. https://doi.org/10.1108/IJIS-08-2022-0145
Youndt, M. A., Subramaniam, M., & Snell, S. A. (2004). Intellectual capital profiles: An examination of investments and returns. Journal of Management Studies, 41(2), 335-361. https://doi.org/10.1111/j.1467-6486.2004.00435.x